Build

Ignite innovation through the continuous development of quality applications.

Defend against privileged user risks.

Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common thread of most data breaches. And as your environment grows increasingly complex, so does the challenge of defending against ever more sophisticated—and damaging—attacks. Privileged Access Management from CA offers a comprehensive solution delivering both network- and host-based controls for the enterprise and hybrid cloud.

INDUSTRY ANALYST REPORT

KuppingerCole Leadership Compass

“CA Privileged Access Management is a comprehensive, mature and overall complete solution that would function well on its own but also integrates fully with other products in the CA Technologies portfolio.”

Combat breaches with Threat Analytics.

CA Threat Analytics for Privileged Access Manager enables the enterprise to continuously assess risk and quickly detect malicious activity among its privileged users. By analyzing various contextual factors about this user and each operation, a risk score can be calculated that can enable further security controls to be applied. The result: reduced threat of insider breach through either malicious or careless activities.

News

A Unified Interoperable Approach Mitigates Risk and Costs for Payment Service Providers with Ability to Rapidly Create New Financial Solutions. CA Technologies, represented in Romania by its strategic partner SolvIT Networks, announced that CA’s solutions that address the requirements of the European Directive PSD2 (Payment Services Directive 2) help banks, payment service providers (PSPs) and […]

RSA, The Security Division of EMC, announced the latest version of RSA Web Threat Detection designed to provide enterprises with end-to-end visibility into web sessions to help mitigate risks associated with consumer-facing websites including cybercrime activity and business logic abuse. RSA Web Threat Detection goes beyond the capabilities of traditional tools to help organizations […]